Cyber-security threats and side-channel attacks for digital agriculture

AN Alahmadi, SU Rehman, HS Alhazmi, DG Glynn… - Sensors, 2022 - mdpi.com
The invention of smart low-power devices and ubiquitous Internet connectivity have
facilitated the shift of many labour-intensive jobs into the digital domain. The shortage of …

A Comprehensive Survey of Side-Channel Sound Sensing Methods

Y Chen, J Yu, L Kong, Y Zhu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
With the rapid developments of Internet of Thing (IoT) technologies, side-channel sound
sensing has become a key research area. Unlike traditional sound sensing methods that …

EVScout2.0: Electric Vehicle Profiling through Charging Profile

A Brighente, M Conti, D Donadel, F Turrin - ACM Transactions on Cyber …, 2024 - dl.acm.org
Electric Vehicles (EVs) represent a green alternative to traditional fuel-powered vehicles. To
enforce their widespread use, both the technical development and the security of users shall …

A threat modeling framework for IoT-Based botnet attacks

H **, GH Jeon, HWA Choi, S Jeon, JT Seo - Heliyon, 2024 - cell.com
Abstract Internet of Things (IoT) devices are much closer to users than personal computers
used in traditional computing environments. Due to prevalence of IoT devices, even if they …

Plug and power: Fingerprinting usb powered peripherals via power side-channel

R Spolaor, H Liu, F Turrin, M Conti… - IEEE INFOCOM 2023 …, 2023 - ieeexplore.ieee.org
The literature and the news regularly report cases of exploiting Universal Serial Bus (USB)
devices as attack tools for malware injections and private data exfiltration. To protect against …

The Impostor Among {US (B)}:{Off-Path} Injection Attacks on {USB} Communications

R Dumitru, D Genkin, A Wabnitz, Y Yarom - 32nd USENIX Security …, 2023 - usenix.org
USB is the most prevalent peripheral interface in modern computer systems and its inherent
insecurities make it an appealing attack vector. A well-known limitation of USB is that traffic …

Protecting Data at Risk of Unintentional Electromagnetic Emanation: TEMPEST Profiling

V Antić, D Protić, M Stanković, R Prodanović, M Manić… - Applied Sciences, 2024 - mdpi.com
Unintentional electromagnetic (EM) emissions often include information about the data
processed by electronic devices. Intrusion based on an unintentional EM emission leaves …

A deep-learning-based approach to keystroke-injection payload generation

V Gurčinas, J Dautartas, J Janulevičius, N Goranin… - Electronics, 2023 - mdpi.com
Investigation and detection of cybercrimes has been in the spotlight of cybersecurity
research for as long as the topic has existed. Modern methods are required to keep up with …

Security of wireless keyboards: Threats, vulnerabilities and countermeasures

SV Jovanović, DD Protić, VD Antić… - Vojnotehnički …, 2023 - aseestant.ceon.rs
Sažetak Uvod/cilj: Ranjivost računarskih sistema uzrokovana je kompromitujućim
elektromagnetskim zračenjem sa bežičnih tastatura. Pokazano je da bežični uređaji koji …

Design of USB Power Supply Hub with Battery Charger

P Zode, B Neole - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
Nearly all compact electronic devices, such as mobile phones, batteries, tablets, and
portable gaming consoles, require charging. USB chargers are notably compact considering …